Blog Posts Tagged with "Wireless"

959779642e6e758563e80b5d83150a9f

Implanted Medical Devices: Killed by Your App

May 17, 2012 Added by:Danny Lieberman

Danny Lieberman talks about the dangers of implanted cardiac devices (ICD) like pacemakers and other devices like insulin pumps, and considers that it’s only a question of time before we have a drive by execution of a politician with an implanted medical device...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST: Secure Biometric Acquisition with Web Services

May 04, 2012 Added by:Headlines

Researchers at the NIST have developed a new protocol for communicating with biometric sensors over wired and wireless networks, called WS-Biometric Devices (WS-BD), allows desktops, laptops, tablets and smartphones to access sensors that capture biometric data using web services...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Wireless Security: Wi-Fi Hacking Burglars Get Busted

March 22, 2012 Added by:Robert Siciliano

Once a Wi-Fi network was located through wardriving, the hackers remotely watched for information that revealed the network’s security setup and vulnerabilities. Police said they used sophisticated electronic equipment to break through networks with WEP protection...

Comments  (0)

0f57a863af3b7e5bf59a94319a408ff7

Assessment of Visual Voicemail Security

March 19, 2012 Added by:Enno Rey

After activation of the VVM feature, the configuration file is stored containing the username, protocol, state of the account and the server IP. Having the username and server IP an attacker can run brute force attacks against the email server which is exposed to the Internet...

Comments  (6)

37d5f81e2277051bc17116221040d51c

Security Tips When Providing Free Wi-Fi at Your Business

March 08, 2012 Added by:Robert Siciliano

Wi-Fi is great for bringing in customers and as a promotional tool that creates customer loyalty. Merchants such as hotels, coffee shops, burger joints and anyplace with a store front, chairs and tables is offering free Wi-Fi. But what about all the Wi-Fi security threats?

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Medical Devices and Electromagnetic Interference

November 29, 2011 Added by:shawn merdinger

Enamored by technology, we tend to place tremendous faith in electronic gadgets that “just seem to work” – perhaps we are lulled into a sense of technical complacency by the general reliability of technology around us? Do we even have insight into the potential EMI problems?

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Securing Mobile Data Communications

November 17, 2011 Added by:Steven Fox, CISSP, QSA

The selection of encryption algorithms to support a mobile device will be determined by data classification considerations and business requirements. Several vendors in the defense industry are developing FIPS 140-2 validated devices to support applications used by the DoD and NSA...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Seeks Feedback on Wireless Security Guides

November 07, 2011 Added by:Headlines

The NIST has issued two new guides addressing issues with wireless security. The first guide focuses on Bluetooth security, while the second looks at wireless local area networks. The NIST is seeking public comment on the guides via email with a November 10th cutoff for submissions...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

TakeDownCon Focuses on Mobile and Wireless Security

November 02, 2011 Added by:Infosec Island Admin

TakeDownCon has raised the bar and set the standards of what a true technical IT security conference is supposed to be. It aspires to be the ideal platform for information security professionals to congregate to learn, network and share their knowledge...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

October 22, 2011 Added by:Dan Dieterle

This includes everything from bypassing authentication & cracking encryption, to advanced techniques like man-in-the-middle attacks and attacking WPA-Enterprise, with discussions Wireless penetration methodology, testing and reporting...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Mobile and Wireless Security: TakeDownCon Las Vegas

October 19, 2011 Added by:Infosec Island Admin

Due to the rapid escalation of threats affecting wireless operations, TakeDownCon Las Vegas now brings you a highly technical platform which addresses highly technical knowledge which focuses on securing your channels, your data, and ultimately and most importantly – your very own privacy...

Comments  (0)

759c37c6aff04cd46262f93652b5fad5

Penetration Testing Tools Update: New Version of EAPeak Released

October 15, 2011 Added by:Spencer McIntyre

EAPeak is a suite of open source tools to facilitate auditing of wireless networks that utilize the Extensible Authentication Protocol framework for authentication. It provides useful information relating to the security of these networks for PenTesters to use in searching for vulnerabilities...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Taking on Mobile and Wireless Security at TakeDownCon

October 10, 2011 Added by:Infosec Island Admin

TakeDownCon has raised the bar and set the standards of what a true technical IT security conference is supposed to be. It aspires to be the ideal platform for information security professionals to congregate to learn, network and share their knowledge...

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Abusing Windows Virtual Wireless NIC Feature

October 09, 2011 Added by:Kyle Young

If the victim computers are part of a Windows domain and have wireless NICs, by automating Metasploit with a pass-the-hash attack and using my script, one could essentially automate deploying a series of rogue ap points throughout a domain. This would be kind of like a network worm...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

TakeDownCon Las Vegas: Mobile and Wireless Security

October 05, 2011 Added by:Infosec Island Admin

Due to the rapid escalation of threats affecting wireless operations, TakeDownCon Las Vegas now brings you a highly technical platform which addresses highly technical knowledge which focuses on securing your channels, your data, and ultimately and most importantly – your very own privacy...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Man Gets Eighteen Years for Hacking Neighbors

August 12, 2011 Added by:Robert Siciliano

In Minnesota prosecutors put away a “depraved criminal” for 18 years as a result of virtually torturing his neighbors via their Wi-Fi connection. After a brief encounter with his new neighbors he began “a calculated campaign to terrorize his neighbors”...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »